Search results for "Verification"
showing 10 items of 104 documents
An integrated identity verification system for mobile terminals
2005
PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…
The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective
2019
Virtualization in the context of blockchain systems represents an essential phase in the development and migration of services from public chains to enterprise logic. Most of the ongoing blockchain uses-cases are using the existing public ledgers, but for business products and services, there is a need for custom tailored solutions to ensure flexibility and security. The Ethereum Virtual Machine has opened new ways to solve problems that require a public proof by executing logic on a decentralized ecosystem. In a natural evolutive process, virtualization logic was shaped by numerous architectures and business requirements. Beside performance and scalability, enterprise virtual machines are …
A Newcomer's Guide to EICS, the Engineering Interactive Computing Systems Community
2019
[EN] Welcome to EICS, the Engineering Interactive Computing Systems community, PACMHCI/EICS journal, and annual conference! In this short article, we introduce newcomers to the field and to our community with an overview of what EICS is and how it positions with respect to other venues in Human-Computer Interaction, such as CHI, UIST, and IUI, highlighting its legacy and paying homage to past scientific events from which EICS emerged. We also take this opportunity to enumerate and exemplify scientific contributions to the field of Engineering Interactive Computing Systems, which we hope to guide researchers and practitioners towards making their future PACMHCI/EICS submissions successful an…
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol
2012
Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…
Transcranial Magnetic Resonance-guided Focused Ultrasound Surgery (tcMRgFUS) at 1.5T: this is how we do it
2017
Aims and objectives Methods and materials Results Conclusion Personal information References
A task scheduling algorithm for HPC applications using colored stochastic Petri Net models
2017
The increase in demand for High Performance Computing (HPC) scientific applications motivates the efforts to reduce costs of running these applications. The problem to solve is that of dynamical multi-criterial optimal scheduling of an application on a HPC platform with a high number of heterogeneous nodes. The solution proposed by the authors is a HPC hardware-software architecture that includes the infrastructure for two level (node and inter-node level) adaptive load balancing. The article presents the development of an Coloured Petri Net(CPN) for such an architecture. The model was used for the development of a dynamic distributed algorithm for the scheduling problem. The CPN allowed a …
A Magnetostrictive Electric Power Generator for energy harvesting from traffic: Design and experimental verification
2015
In the last decades, the growth in energy demand, the decrease of fossil fuels available in the market and the impact of anthropogenic factors on climate change has given new impulse to research on renewable energy systems, particularly those known as energy harvesting devices (EHDs) [1]. A large number of EHDs have been proposed, using different operating principle [1-4]. Among them, piezoelectric and magnetostrictive seem to be particularly suitable for the application in EHD. In these materials the application of external mechanical stress induces a change in the level of magnetization and therefore an electromotive force (emf) can be generated and collected in order to produce electrica…
Identification and Handling of Critical Irradiance Forecast Errors Using a Random Forest Scheme – A Case Study for Southern Brazil
2015
Abstract Large forecast errors of solar power prediction cause challenges for the management of electric grids. Here, the classification technique Random Forests is applied to analyze the possible linkage of hourly or daily forecast errors to the actual situation given by a set of meteorological variables. This form a prediction of the forecast error and is thus usable to update the forecast. The performance of this scheme is assessed for the example of irradiance forecasts in Brazil. While limited to none improvements are obtained for next-hour forecasts, significant improvements are obtained for the next-day forecasts.
Validación y verificación analítica de los métodos microbiológicos
2015
Clinical microbiologists should ensure, to the maximum level allowed by the scientific and technical development, the reliability of the results. This implies that, in addition to meeting the technical criteria to ensure their validity, they must be performed with a number of conditions that allows comparable results to be obtained, regardless of the laboratory that performs the test. In this sense, the use of recognized and accepted reference methodsis the most effective tool for these guarantees. The activities related to verification and validation of analytical methods has become very important, as there is continuous development, as well as updating techniques and increasingly complex …
Fingerprint image enhancement using directional morphological filter
2005
Fingerprint images quality enhancement is a topic phase to ensure good performance in an automatic fingerprint identification system (AFIS) based on minutiae matching. In this paper a new fingerprint enhancement algorithm based on morphological filter is introduced. The algorithm is based on three steps: directional decomposition, morphological filter and composition. The performance of the proposed approach has been evaluated on two sets of images: the first one is DB3 database from Fingerprint Verification Competition (FVC) and the second one is self collected using an optical scanner